Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 81:

    On Monday, the Chief Information Officer (CIO) of a state agency received an e-discovery request for the release of all emails sent and received by the agency board of directors for the past five years. The CIO has contacted the email administrator and asked the administrator to provide the requested information by end of day on Friday. Which of the following has the GREATEST impact on the ability to fulfill the e- discovery request?

    A. Data retention policy

    B. Backup software and hardware

    C. Email encryption software

    D. Data recovery procedures

  • Question 82:

    The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The network administrator reviews the tickets and compiles the following information for the security administrator:

    Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0

    Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0

    Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0

    All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface's MAC is 00-01-42-32-ab-1a ------ The security administrator brings a laptop to the finance office, connects it to

    one of the wall jacks, starts up a network analyzer, and notices the following:

    09:05:10.937590 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)

    09:05:15.934840 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)

    09:05:19.931482 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52) Which of the following can the security administrator determine from the above information?

    A. A man in the middle attack is underway - implementing static ARP entries is a possible solution.

    B. An ARP flood attack targeted at the router is causing intermittent communication implementing IPS is a possible solution.

    C. The default gateway is being spoofed - implementing static routing with MD5 is a possible solution.

    D. The router is being advertised on a separate network - router reconfiguration is a possible solution.

  • Question 83:

    The security administrator is worried about possible SPIT attacks against the VoIP system.

    Which of the following security controls would MOST likely need to be implemented to detect this type of attack?

    A. SIP and SRTP traffic analysis

    B. QoS audit on Layer 3 devices

    C. IP and MAC filtering logs

    D. Email spam filter log

  • Question 84:

    The company is about to upgrade a financial system through a third party, but wants to legally ensure that no sensitive information is compromised throughout the project. The project manager must also make sure that internal controls are set to mitigate the potential damage that one individual's actions may cause. Which of the following needs to be put in place to make certain both organizational requirements are met? (Select TWO).

    A. Separation of duties

    B. Forensic tasks

    C. MOU

    D. OLA

    E. NDA

    F. Job rotation

  • Question 85:

    Which of the following refers to programs running in an isolated space to run untested code and prevents the code from making permanent changes to the OS kernel and other data on the host machine?

    A. Input Validation

    B. Application hardening

    C. Code signing

    D. Application sandboxing

  • Question 86:

    A company has decided to relocate and the security manager has been tasked to perform a site survey of the new location to help in the design of the physical infrastructure. The current location has video surveillance throughout the building

    and entryways.

    The following requirements must be met:

    Able to log entry of all employees in and out of specific areas

    Access control into and out of all sensitive areas

    Tailgating prevention

    Which of the following would MOST likely be implemented to meet the above requirements and provide a secure solution? (Select TWO).

    A. Discretionary Access control

    B. Man trap

    C. Visitor logs

    D. Proximity readers

    E. Motion detection sensors

  • Question 87:

    A company has asked their network engineer to list the major advantages for implementing a virtual environment in regards to cost. Which of the following would MOST likely be selected?

    A. Ease of patch testing

    B. Reducing physical footprint

    C. Reduced network traffic

    D. Isolation of applications

  • Question 88:

    The security administrator has been tasked with providing a solution that would not only eliminate the need for physical desktops, but would also centralize the location of all desktop applications, without losing physical control of any network devices. Which of the following would the security manager MOST likely implement?

    A. VLANs

    B. VDI

    C. PaaS

    D. IaaS

  • Question 89:

    A certain script was recently altered by the author to meet certain security requirements, and needs to be executed on several critical servers. Which of the following describes the process of ensuring that the script being used was not altered by anyone other than the author?

    A. Digital encryption

    B. Digital signing

    C. Password entropy

    D. Code signing

  • Question 90:

    A user logs into domain A using a PKI certificate on a smartcard protected by an 8 digit PIN. The credential is cached by the authenticating server in domain A. Later, the user attempts to access a resource in domain B. This initiates a request to the original authenticating server to somehow attest to the resource server in the second domain that the user is in fact who they claim to be.

    Which of the following is being described?

    A. Authentication

    B. Authorization

    C. SAML

    D. Kerberos

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.